Source “Pervasive Computing: Vision and Challenges” M. Satyanarayanan, Carnegie Mellon University IEEE Personal Communications, pp. 10-17, August 2001.

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Source: IEEE Pervasive Computing, Vol. 8, Issue.4, Oct.2009, pp. 14 – 23 Author: Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N. Adviser: Chia-Nian.
Service-Based Paradigm Anchoring the Indefinable Field Of Pervasive Computing Presenter: Vijay Dheap.
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
NDN in Local Area Networks Junxiao Shi The University of Arizona
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 9 Distributed Systems Architectures Slide 1 1 Chapter 9 Distributed Systems Architectures.
Company name KUAS HPDS Using Remote Memory Paging for Handheld Devices in a Pervasive Computing Environment Arjuna Sathiaseelan.
Pervasive Computing 通訊所 鄭筱親. Outline  Introduction  Context Awareness  Recent Research  Future and Conclusion.
High Performance Computing Course Notes Grid Computing.
A Computation Management Agent for Multi-Institutional Grids
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Agent Mediated Grid Services in e-Learning Chun Yan, Miao School of Computer Engineering Nanyang Technological University (NTU) Singapore April,
Distributed Systems Architectures
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
Ambient Computational Environments Sprint Research Symposium March 8-9, 2000 Professor Gary J. Minden The University of Kansas Electrical Engineering and.
Reducing the Energy Usage of Office Applications Jason Flinn M. Satyanarayanan Carnegie Mellon University Eyal de Lara Dan S. Wallach Willy Zwaenepoel.
ISA5428: 普及計算 Pervasive Computing Course Outline 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期 (Slides are taken from the presentations by Prof. Friedemann Mattern of.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Ch 1. Mobile Adaptive Computing Myungchul Kim
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
MOBILE CLOUD COMPUTING
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
1 소프트웨어공학 강좌 Chap 9. Distributed Systems Architectures - Architectural design for software that executes on more than one processor -
A Lightweight Platform for Integration of Resource Limited Devices into Pervasive Grids Stavros Isaiadis and Vladimir Getov University of Westminster
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Mobile Computing and Wireless Networking
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Developing an Effective Wireless Middleware Strategy.
Chapter 4 Decision Support System & Artificial Intelligence.
Jini Architectural Overview Li Ping
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
Introduction to Pervasive Computing
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
©Ian Sommerville 2000, Tom Dietterich 2001 Slide 1 Distributed Systems Architectures l Architectural design for software that executes on more than one.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
Data-Centric Systems Lab. A Virtual Cloud Computing Provider for Mobile Devices Gonzalo Huerta-Canepa presenter 김영진.
Internet of Things. Creating Our Future Together.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Networking Applications
Mobile Computing.
Project Oxygen… Shashwat Shriparv
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

ISA5428: 普及計算 Research Issues 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期

Source “Pervasive Computing: Vision and Challenges” M. Satyanarayanan, Carnegie Mellon University IEEE Personal Communications, pp. 10-17, August 2001 Pervasive Computing

Outline Related fields Example scenario Drill down Conclusion Distributed System Mobile Computing Pervasive Computing Example scenario Drill down Conclusion Pervasive Computing

Distributed Systems Research involving two or more computers connected by a network Areas foundational to pervasive computing: Remote communication: protocol layering, RPC, end-to-end argument Fault tolerance: atomic transactions, two phase commit High availability: replica control, mirrored execution, recovery Remote information access: caching, function shipping, distributed file system Security: authentication, privacy Pervasive Computing

Mobile Computing (1/2) Research on building distributed systems with mobile clients Principles in distributed system design still apply 4 constraints to distinguish it from distributed systems and demand new research Unpredictable variation in network quality Lowered trust and robustness of mobile elements Limited local resources imposed by weight and size Battery power consumption Pervasive Computing

Mobile Computing (2/2) Research areas: Mobile networking: mobile IP, ad hoc protocols, improving TCP performance in wireless networks Mobile information access: selective control of data consistency Support for adaptive applications: transcoding by proxies System-level energy saving techniques: energy-aware adaptation, variable speed processor scheduling Location sensitivity: location sensing, location-aware system behavior Pervasive Computing

Pervasive Computing Pervasive computing environment: An environment saturated with computing and communication capability, yet so gracefully integrated with users that it becomes a “technology that disappears” Subsume distributed computing and mobile computing, but incorporate 4 additional research thrusts (next figure) Pervasive Computing

Pervasive Computing

4 Additional Research Areas (1/2) Effective use of smart spaces: Space: an enclosed area or a well-defined open area Smart space: embedding computing infrastructure in building infrastructure => physical/virtual converge Enable sensing and control of one world by the other Example? Invisibility: Minimal user distraction is a more practical goal Ex.: the environment continuously meets user expectations and rarely presents him with surprises Some alerts may still be needed Pervasive Computing

4 Additional Research Areas (2/2) Localized scalability: Increasing complexity in interactions between a user’s personal computing space and surroundings as well as other persons Must consider scalability with physical distance Masking uneven conditioning Different environments will have huge differences in their smartness, causing user distraction One solution: have user’s personal computing space to compensate Complete invisibility may be impossible, but reduced variability is possible Pervasive Computing

Outline Related fields Example scenario Drill down Conclusion Miss Capabilities Drill down Conclusion Pervasive Computing

Scenario 1 Jane is at Gate 23 of an airport and would like to e-mail her edited files through wireless connection, but the bandwidth is miserable Aura, the pervasive computing environment, detects the situation, consults airport servers, and finds Gate 15 will have no flight in 1.5 hour Aura suggests Jane to go to Gate 15 and prioritize her email Jane accepts the suggestions Files are transmitted at Gate 15 and Aura informs Jane when she needs to be back to gate Pervasive Computing

Scenario 2 Fred has to walk to a meeting from his office to give a presentation, but he is not quite ready yet Fred grabs a handheld computer and starts walking to the meeting Aura transfers his state from desktop to handheld, and Fred does final editing with voice Aura infers Fred’s schedule, downloads materials to projection computer and warms up projector Room’s face detection system recognizes some unfamiliar faces and advises Fred not to show sensitive data Pervasive Computing

Some Key Aspects Scenario 1: Scenario 2: Proactivity: Aura can estimate how long the whole process takes and look ahead on her behalf Combining knowledge from different layers: wireless congestion and boarding time Smart space: provide information of wireless BW, flight time and gates, distance between gates Scenario 2: Moving execution state across diverse platforms Automatic adjusting behavior to fit circumstances: voice inputs Proactivity and smart space Pervasive Computing

Missing Capabilities Component technologies are simple and basic They are available today The challenge: The seamless integration of component technologies into a pervasive computing system Architecture Component synthesis System-level engineering Pervasive Computing

Outline Related fields Example scenario Drill down Conclusion User intent Cyber foraging Adaptation strategy High-level energy management Client thickness Context awareness Balancing proactivity and transparency Privacy and trust Impact on layering Conclusion Pervasive Computing

The Model Each user is immersed in a personal computing space that mediates all interactions with the pervasive computing elements in surroundings As a command center System design: wearable computer? personal assistant? thicker or thinner? what sensors and networking? Context aware: how to know user’s state and surrounding, and modify behavior How to cooperate and interact with infrastructure? with other persons? How to roam and adapt? reconfigurable? => PDA with 802.11b, Java Pervasive Computing

Issue: Smart Object/Environment Provide services System design: which embedded system? web server? sensors and actuators? NW? Naming, registration, discovery Physical/virtual mapping Mobile management, energy management Service composition, I/O matching, adaptation, environment monitoring Pervasive Computing

Issue: Infrastructure Support Infrastructures in real life e.g., electricity, roads, ... Just there or even invisible, open platform Internet infrastructure Domain name service (DNS registry) Services: cooperating routers, time servers TCP/IP: common formats/protocols Web standards Extend the Internet to everyday objects Pervasive Computing

Infrastructure for Smart Objects Guarantee Security, privacy, availability, reliability Provide services Location (Where am I?) Context (Are we in a meeting?) Event delivery (Tell me when... happens) Brokering (Find something that…) Directory, discovery, registry Mobility, roaming, ... For applications built with smart objects For smart objects How do we organize billions of mobile smart objects that are highly dynamic, short living,…? Pervasive Computing

Issue: User Intent (1/2) A pervasive computing system must track user intent Determine which actions will help, not hinder, user Ex.: suppose a user is viewing video over a network, whose bandwidth suddenly drops. Should the system Reduce the fidelity of the video? Pause briefly to find another higher-bandwidth connection? Advise the user that the task can no longer be accomplished? Correct choice depends on what user is trying to accomplish Pervasive Computing

User Intent (2/2) Today’s applications either have no idea about user intent (e.g. to support adaptation and proactivity), or do it badly Issues: Can user intent be inferred, or does it have to be explicitly provided? How is user intent represented internally? What are represented? How does one characterize accuracy of knowledge? Is incomplete or imprecise information useful? Will obtaining intent place an burden on the user? Pervasive Computing

Issue: Cyber Foraging (1/2) Dynamically augment computing resources of end user devices with wired hardware infrastructure => surrogate Usage: On entering a neighborhood, a device detects the presence of surrogates and negotiates its use Surrogates serve as gateway to the Internet and server for heavy computation When the device leaves the neighborhood, surrogate binding is broken and staged data are discarded Pervasive Computing

Cyber Foraging (2/2) Issues: How to discover the presence of surrogates? How to establish an appropriate level of trust? How to amortize the cost of establishing trust? How to balance the load of surrogates? How to minimize latency in serving devices? How to deploy surrogates? How scalable? How to make surrogate uses seamless and minimally intrusive for a user? Pervasive Computing

Issue: Adaptation Strategy (1/2) Necessary when there is significant mismatch between the supply and demand of a resource, e.g. bandwidth, energy, computing cycles, ... Three strategies for adaptation The client guides applications in changing their behavior The client asks the environment to guarantee a certain level of a resource The client suggests a corrective action to the user Pervasive Computing

Adaptation Strategy (2/2) Issues: How does a client choose between adaptation strategies? How strategies be changed seamlessly as user moves? How to do resource reservation in a smart space? What are appropriate admission control policies? What API are needed to make reservation? Will corrective actions be intrusive? How to do it, e.g. API, programming model? What is the relationship between lowing fidelity and adaptation? Pervasive Computing

Issue: High-Level Energy Management Necessary because low-level techniques, e.g. battery and circuit design, are insufficient Issues: What high-level systems can be managed for energy efficiency? (memory, application adaptation, …) Are they intrusive to the user? Can user intent help? Can smart spaces and surrogates be used to reduce energy demand on a mobile device? How to tradeoff the energy used in remote execution with wireless connection? Pervasive Computing

Issue: Client Thickness How powerful does a mobile client need to be? From bare-bones devices (high-resolution displays thru wireless to servers) to full-function clients (standalone & disconnected operation) Issues: How to quantify thickness with env. conditioning, e.g., sensors added and better networking? How to migrate app. between clients of different thickness? How to cooperate with infrastructure? Can clients be reconfigurable to adapt to env.? Semi-portable infrastructure for less hospitable env.? How to roam transparently? especially from a benign environment to a poor one? How to lower the cost of diversity in devices? Pervasive Computing

Issue: Context Awareness Needed for an environment minimally intrusive Recognize user state and surroundings Make decisions proactively, modify behavior accordingly Issues: Obtaining information needed to function How to represent context internally? How to combine it with system and application state? Where to store? How often to update and consult context information? What services does the infrastructure have to provide? How to track location? sense surroundings? Pervasive Computing

Issue: Proactivity and Transparency How not to annoy a user in a proactive system? => self-tuning according to user expertise and experiences Issues: How are user preferences and tolerances specified and taken into account? How to determine the right level of balance? Pervasive Computing

Issue: Privacy and Trust A pervasive computing environment needs to monitor user actions almost continuously in order to be effective Need mutual trust between environment and user Issues: Tradeoff between seamless system behavior and privacy/trust enforcement Any appropriate authentication techniques? How to specify security constraints? How to specify one’s identity? Pervasive Computing

Issue: Impact on Layering Pervasive computing often requires merging information from different layers a system Issues: Relationship between layering and pervasive computing How to create a new layer? Pervasive Computing

Conclusions Almost all sub domains in CS are affected System infrastructures, networking, security, user interfaces, embedded systems, AI, perception, speech recognition,... We are already moving in this direction XML, UDDI, mobile IP, Jini, ... Systems integration is the key Many new and fascinating research problems emerge! Pervasive Computing

The Field Is Burgeoning IEEE Pervasive magazine Springer Personal and Ubiquitous Computing Ubicomp Various links to universities, research institutes, companies Pervasive Computing